Notepad++ released version 8.8.9 in December, which checks digital signatures and certificates before installing any updates.
State-sponsored hackers' are being blamed for compromising the popular alternative to Windows Notepad over a period of six months last year.
Some Notepad++ users were redirected to malicious servers last year. Now, its developer says they were targeted by Chinese ...
A software update mechanism for the popular text editor Notepad++ was hijacked by suspected Chinese state-sponsored hackers, allowing them to silently redirect some users to malicious update servers, ...
Notepad++ targeted and used to deliver poisoned updates to a select group of victims.
The hosting provider's compromise allowed attackers to deliver malware through tainted software updates for six months.
Rapid7 links China-linked Lotus Blossom to a 2025 Notepad++ hosting breach that delivered the Chrysalis backdoor via hijacked updates, fixed in v8.8.9 ...
State-sponsored threat actors compromised the popular code editor's hosting provider to redirect targeted users to malicious ...
A Chinese-linked cyberespionage group targeted Notepad++'s update process to deploy malware. The attack from June to December 2025 selectively affected users, prompting investigations. Hosting ...
The attacks came from a third-party and not from the Notepad++ team.
Attackers had specifically delivered malware to systems using the Notepad++ updater. Investigations point to state actors.
State-backed attackers hijacked Notepad++ update traffic via a hosting provider breach, redirecting users to malicious downloads since June 2025.